Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2023, 14:34

General

  • Target

    a85df150564c0e72b2b9cb7cefe631c6f51bc5b81866f25e60e16a38e1a659e6.exe

  • Size

    13.4MB

  • MD5

    90daf8a198eeb6643ab3b691efa272c3

  • SHA1

    b08b5970827776f0c9601224efe0ebcbdefa46c8

  • SHA256

    a85df150564c0e72b2b9cb7cefe631c6f51bc5b81866f25e60e16a38e1a659e6

  • SHA512

    15419d015db8516449f9f0eefc5be05a98433b3f866fb171d2970f2a09e3d80520de048c5993e26aa088b730ad467b1b0d3757c11493e8bec4f404e2a37ed3be

  • SSDEEP

    393216:IbTIJoZO93fb9zfzG7q21tIUAO+RYIxttNPryaW2:IbnOpb0e6tIULytNPuaW

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a85df150564c0e72b2b9cb7cefe631c6f51bc5b81866f25e60e16a38e1a659e6.exe
    "C:\Users\Admin\AppData\Local\Temp\a85df150564c0e72b2b9cb7cefe631c6f51bc5b81866f25e60e16a38e1a659e6.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3860

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3860-0-0x0000000000400000-0x0000000001677000-memory.dmp

          Filesize

          18.5MB

        • memory/3860-1-0x00000000771A4000-0x00000000771A6000-memory.dmp

          Filesize

          8KB

        • memory/3860-2-0x0000000010000000-0x0000000010017000-memory.dmp

          Filesize

          92KB

        • memory/3860-3-0x0000000000400000-0x0000000001677000-memory.dmp

          Filesize

          18.5MB

        • memory/3860-4-0x00000000058F0000-0x00000000058F1000-memory.dmp

          Filesize

          4KB

        • memory/3860-5-0x00000000059A0000-0x00000000059A1000-memory.dmp

          Filesize

          4KB

        • memory/3860-7-0x0000000005930000-0x0000000005931000-memory.dmp

          Filesize

          4KB

        • memory/3860-6-0x0000000005970000-0x0000000005971000-memory.dmp

          Filesize

          4KB

        • memory/3860-9-0x0000000005910000-0x0000000005911000-memory.dmp

          Filesize

          4KB

        • memory/3860-11-0x00000000059D0000-0x00000000059D1000-memory.dmp

          Filesize

          4KB

        • memory/3860-10-0x00000000059C0000-0x00000000059C2000-memory.dmp

          Filesize

          8KB

        • memory/3860-13-0x0000000005920000-0x0000000005921000-memory.dmp

          Filesize

          4KB

        • memory/3860-12-0x0000000005990000-0x0000000005991000-memory.dmp

          Filesize

          4KB

        • memory/3860-14-0x0000000005900000-0x0000000005901000-memory.dmp

          Filesize

          4KB

        • memory/3860-16-0x0000000005A10000-0x0000000005A11000-memory.dmp

          Filesize

          4KB

        • memory/3860-15-0x00000000059B0000-0x00000000059B1000-memory.dmp

          Filesize

          4KB

        • memory/3860-17-0x0000000005950000-0x0000000005951000-memory.dmp

          Filesize

          4KB

        • memory/3860-18-0x0000000005940000-0x0000000005941000-memory.dmp

          Filesize

          4KB

        • memory/3860-19-0x0000000010000000-0x0000000010017000-memory.dmp

          Filesize

          92KB

        • memory/3860-21-0x0000000005A30000-0x0000000005A31000-memory.dmp

          Filesize

          4KB

        • memory/3860-20-0x0000000005A50000-0x0000000005A51000-memory.dmp

          Filesize

          4KB

        • memory/3860-23-0x0000000005960000-0x0000000005961000-memory.dmp

          Filesize

          4KB

        • memory/3860-22-0x0000000005A00000-0x0000000005A01000-memory.dmp

          Filesize

          4KB

        • memory/3860-25-0x0000000005A70000-0x0000000005A71000-memory.dmp

          Filesize

          4KB

        • memory/3860-24-0x0000000005A40000-0x0000000005A41000-memory.dmp

          Filesize

          4KB

        • memory/3860-26-0x0000000005980000-0x0000000005981000-memory.dmp

          Filesize

          4KB

        • memory/3860-27-0x0000000005A20000-0x0000000005A21000-memory.dmp

          Filesize

          4KB

        • memory/3860-28-0x00000000058B0000-0x00000000058B1000-memory.dmp

          Filesize

          4KB

        • memory/3860-30-0x00000000059F0000-0x00000000059F1000-memory.dmp

          Filesize

          4KB

        • memory/3860-29-0x0000000005A60000-0x0000000005A61000-memory.dmp

          Filesize

          4KB

        • memory/3860-32-0x0000000005B50000-0x0000000005B52000-memory.dmp

          Filesize

          8KB

        • memory/3860-31-0x0000000000400000-0x0000000001677000-memory.dmp

          Filesize

          18.5MB

        • memory/3860-33-0x00000000059E0000-0x00000000059E1000-memory.dmp

          Filesize

          4KB